Offloading personal security applications to a secure and trusted network node.
Roberto BonafigliaFrancesco CiacciaAntonio LioyMario NemirovskyFulvio RissoTao SuPublished in: NetSoft (2015)
Keyphrases
- security measures
- network connection
- trusted computing
- security issues
- security threats
- security requirements
- trust relationships
- key management
- security mechanisms
- security management
- security architecture
- malicious nodes
- network management
- security level
- computer networks
- application level
- computer security
- remote attestation
- network nodes
- security properties
- wireless sensor networks
- security analysis
- information security
- single point of failure
- sensitive data
- stream cipher
- security model
- ad hoc networks
- network structure
- identity management
- key agreement protocol
- network access
- trusted platform module
- user authentication
- authentication protocol
- security protocols
- computing platform
- network security
- network traffic
- complex networks
- intrusion detection
- cloud computing
- private key
- privacy issues
- security policies
- smart card
- key exchange protocol
- peer to peer